TELKOMNIKA Telecommunication, Computing, Electronics and Control
The quality of image encryption techniques by reasoned logic
Dublin Core
Title
TELKOMNIKA Telecommunication, Computing, Electronics and Control
The quality of image encryption techniques by reasoned logic
The quality of image encryption techniques by reasoned logic
Subject
Correlation, Encryption, Entropy, Fuzzy logic, NPCR
Description
One form of data is digital images, because of their widespread of frequent exchange over the Internet it is necessary to preserve the security and privacy of the images transmitted. There are many image encryption techniques that have different security levels and there are many standards and protocols for testing the quality of encryption security. The cipher images can be evaluated using various quality measuring criteria, these measures quantify certain features of the image. If there are many methods that can be applied to secure images; the question is what is the most powerful scheme that can be used among these methods? This research try to answer this question by taking three different encryption methods (rivest cipher 5 (RC5), chaotic and permutation) and measure their quality using the peek signal to noise ratio (PSNR), correlation, entropy, number of pixels changes rate (NPCR) and unified average changing intensity (UACI), the results of these criteria were input to a fuzzy logic system that was used to find the best one among them.
Creator
Marwah Kamil Hussein, Kareem Radhi Hassan, Haider M. Al-Mashhadi
Source
DOI: 10.12928/TELKOMNIKA.v18i6.14340
Publisher
Universitas Ahmad Dahlan
Date
October 2020
Contributor
Sri Wahyuni
Rights
ISSN: 1693-6930
Relation
http://journal.uad.ac.id/index.php/TELKOMNIKA
Format
PDF
Language
English
Type
Text
Coverage
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Files
Collection
Citation
Marwah Kamil Hussein, Kareem Radhi Hassan, Haider M. Al-Mashhadi, “TELKOMNIKA Telecommunication, Computing, Electronics and Control
The quality of image encryption techniques by reasoned logic,” Repository Horizon University Indonesia, accessed November 21, 2024, https://repository.horizon.ac.id/items/show/4148.
The quality of image encryption techniques by reasoned logic,” Repository Horizon University Indonesia, accessed November 21, 2024, https://repository.horizon.ac.id/items/show/4148.